An AWS Labs Model Context Protocol (MCP) server for mysql
Project description
AWS Labs MySQL MCP Server
An AWS Labs Model Context Protocol (MCP) server for Aurora MySQL
Features
Natural language to MySQL SQL query
- Converting human-readable questions and commands into structured MySQL-compatible SQL queries and executing them against the configured Aurora MySQL database.
Prerequisites
- Install
uvfrom Astral or the GitHub README - Install Python using
uv python install 3.10 - Aurora MySQL Cluster with MySQL username and password stored in AWS Secrets Manager
- Enable RDS Data API for your Aurora MySQL Cluster, see instructions here
- This MCP server can only be run locally on the same host as your LLM client.
- Docker runtime
- Set up AWS credentials with access to AWS services
- You need an AWS account with appropriate permissions
- Configure AWS credentials with
aws configureor environment variables
Installation
| Cursor | VS Code |
|---|---|
Configure the MCP server in your MCP client configuration (e.g., for Amazon Q Developer CLI, edit ~/.aws/amazonq/mcp.json):
Connection Methods
This MCP server supports two connection methods:
-
RDS Data API Connection (using
--resource_arn): Uses the AWS RDS Data API to connect to Aurora MySQL. This method requires that your Aurora cluster has the Data API enabled. -
Direct MySQL Connection (using
--hostname): Uses asyncmy to connect directly to any MySQL database, including Aurora MySQL, RDS MySQL, RDS MariaDB, or self-hosted MySQL/MariaDB instances.
Choose the connection method that best fits your environment and requirements.
Option 1: Using RDS Data API Connection (for Aurora MySQL)
{
"mcpServers": {
"awslabs.mysql-mcp-server": {
"command": "uvx",
"args": [
"awslabs.mysql-mcp-server@latest",
"--resource_arn", "[your data]",
"--secret_arn", "[your data]",
"--database", "[your data]",
"--region", "[your data]",
"--readonly", "True"
],
"env": {
"AWS_PROFILE": "your-aws-profile",
"AWS_REGION": "us-east-1",
"FASTMCP_LOG_LEVEL": "ERROR"
},
"disabled": false,
"autoApprove": []
}
}
}
Option 2: Using Direct MySQL Connection (for Aurora MySQL, RDS MySQL, and RDS MariaDB)
{
"mcpServers": {
"awslabs.mysql-mcp-server": {
"command": "uvx",
"args": [
"awslabs.mysql-mcp-server@latest",
"--hostname", "[your data]",
"--secret_arn", "[your data]",
"--database", "[your data]",
"--region", "[your data]",
"--readonly", "True"
],
"env": {
"AWS_PROFILE": "your-aws-profile",
"AWS_REGION": "us-east-1",
"FASTMCP_LOG_LEVEL": "ERROR"
},
"disabled": false,
"autoApprove": []
}
}
}
Note: The --port parameter is optional and defaults to 3306 (the standard MySQL port). You only need to specify it if your MySQL instance uses a non-default port.
Windows Installation
For Windows users, the MCP server configuration format is slightly different:
{
"mcpServers": {
"awslabs.mysql-mcp-server": {
"disabled": false,
"timeout": 60,
"type": "stdio",
"command": "uv",
"args": [
"tool",
"run",
"--from",
"awslabs.mysql-mcp-server@latest",
"awslabs.mysql-mcp-server.exe"
],
"env": {
"FASTMCP_LOG_LEVEL": "ERROR",
"AWS_PROFILE": "your-aws-profile",
"AWS_REGION": "us-east-1"
}
}
}
}
Build and install docker image locally on the same host of your LLM client
- 'git clone https://github.com/awslabs/mcp.git'
- Go to sub-directory 'src/mysql-mcp-server/'
- Run 'docker build -t awslabs/mysql-mcp-server:latest .'
Add or update your LLM client's config with following:
{
"mcpServers": {
"awslabs.mysql-mcp-server": {
"command": "docker",
"args": [
"run",
"-i",
"--rm",
"-e", "AWS_ACCESS_KEY_ID=[your data]",
"-e", "AWS_SECRET_ACCESS_KEY=[your data]",
"-e", "AWS_REGION=[your data]",
"awslabs/mysql-mcp-server:latest",
"--resource_arn", "[your data]",
"--secret_arn", "[your data]",
"--database", "[your data]",
"--region", "[your data]",
"--readonly", "True"
]
}
}
}
NOTE: By default, only read-only queries are allowed and it is controlled by --readonly parameter above. Set it to False if you also want to allow writable DML or DDL.
AWS Authentication
The MCP server uses the AWS profile specified in the AWS_PROFILE environment variable. If not provided, it defaults to the "default" profile in your AWS configuration file.
"env": {
"AWS_PROFILE": "your-aws-profile"
}
Make sure the AWS profile has permissions to access the RDS data API, and the secret from AWS Secrets Manager. The MCP server creates a boto3 session using the specified profile to authenticate with AWS services. Your AWS IAM credentials remain on your local machine and are strictly used for accessing AWS services.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file awslabs_mysql_mcp_server-1.0.8.tar.gz.
File metadata
- Download URL: awslabs_mysql_mcp_server-1.0.8.tar.gz
- Upload date:
- Size: 100.9 kB
- Tags: Source
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
1120ba2243f26bb37c508ec3a6132fb554c703990bd265ca15a5b87f52074051
|
|
| MD5 |
92381ae24b86716d0ffe2825dbcbba27
|
|
| BLAKE2b-256 |
04ab8a6c4f1a3cf5a77d27b423a1b9581288612f4190520cb0bf9e6407f29c2f
|
Provenance
The following attestation bundles were made for awslabs_mysql_mcp_server-1.0.8.tar.gz:
Publisher:
release.yml on awslabs/mcp
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
awslabs_mysql_mcp_server-1.0.8.tar.gz -
Subject digest:
1120ba2243f26bb37c508ec3a6132fb554c703990bd265ca15a5b87f52074051 - Sigstore transparency entry: 659310370
- Sigstore integration time:
-
Permalink:
awslabs/mcp@e7e41673a914dc2e5513b7688cfbda5a604d3c51 -
Branch / Tag:
refs/tags/2025.10.20251031142413 - Owner: https://github.com/awslabs
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
release.yml@e7e41673a914dc2e5513b7688cfbda5a604d3c51 -
Trigger Event:
push
-
Statement type:
File details
Details for the file awslabs_mysql_mcp_server-1.0.8-py3-none-any.whl.
File metadata
- Download URL: awslabs_mysql_mcp_server-1.0.8-py3-none-any.whl
- Upload date:
- Size: 23.5 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
7c8acffff88626017f8b60f553e113aa708ca8e836940d34c7462b5a13fc70f1
|
|
| MD5 |
1664b753be455f419be11005d7517d4b
|
|
| BLAKE2b-256 |
888c02bd50314237cce576dec3e6ac74e89c75bedf006c51faa923cd0a205aea
|
Provenance
The following attestation bundles were made for awslabs_mysql_mcp_server-1.0.8-py3-none-any.whl:
Publisher:
release.yml on awslabs/mcp
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
awslabs_mysql_mcp_server-1.0.8-py3-none-any.whl -
Subject digest:
7c8acffff88626017f8b60f553e113aa708ca8e836940d34c7462b5a13fc70f1 - Sigstore transparency entry: 659310375
- Sigstore integration time:
-
Permalink:
awslabs/mcp@e7e41673a914dc2e5513b7688cfbda5a604d3c51 -
Branch / Tag:
refs/tags/2025.10.20251031142413 - Owner: https://github.com/awslabs
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
release.yml@e7e41673a914dc2e5513b7688cfbda5a604d3c51 -
Trigger Event:
push
-
Statement type: